Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe
-
Size
36KB
-
MD5
58515856491edfae4e28dde5fe1294fc
-
SHA1
29465a1b65ad4bf30ea79d300ee231eec928eb1c
-
SHA256
51001316e915fd7f0a30663e23caa190807d96367ed0ff89b7e295a8619c08cb
-
SHA512
8c5df7a767d61f935989f30229f6652fdd98b2bcf572cb0758f10758e0c3d2ce2a63665b7c7fbfa74e32d514aef69c08a915fa3503ee91d6c7049f652d055fb8
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzo6c3l8Sz960SPluhX:bAvJCYOOvbRPDEgXRc3SSz3SPq
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x00080000000233e3-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation 2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 4668 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4668 4496 2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe 87 PID 4496 wrote to memory of 4668 4496 2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe 87 PID 4496 wrote to memory of 4668 4496 2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_58515856491edfae4e28dde5fe1294fc_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5e6a1ec9d61ada9e3034121e9ed2ded6d
SHA13928efe2e529f01c2800ec597e19a3234e9b1d16
SHA25660742dece17b96022ec5a8e4c8450d28a9094aa6ae639bf0d6b72829e80e8382
SHA512d3c9e9d3ead32ec319cd8d56b87af37228b17435f006f386399272598305fdcb8ad0a4931e1aa2bd2866f62d270d607e0397554a9c55e72a1830f9395baf86bc